You will now get a list of AUMID’s in this example we are looking for edge

As you can see the AUMID for edge is Microsoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge

Now we need to create a profile so we can assign this app to run in kiosk mode.

Intune -> Device Configuration -> Profiles -> Create Profile

Name the profile and select “Windows 10 and later” as platform, then set the profile type to “Device restrictions” next click the “Configure” button.

Select “Kiosk (Preview)” then set “Kiosk Mode” to “Single app kiosk” enter your user account and the Application user model ID of the app as we did earlier in this post.

TIP1: If using auto logon you should probably use a local account for the kiosk. But in this example we use an AzureAD account. Any AzureAD account assigned must be written like this “AzureDAusername@domainname.com”

TIP2: If you want to run a legacy Win32 application you need to use “Multi app kiosk” as the “Kiosk Mode”

Now create this setting and lets assign it to the device group made earlier.

I found it surprising when I started with Azure Active Directory that there was no support for nested groups. No worries, PowerShell to the rescue!

First off you need to install the Azure Active Directory PowerShell module from the Powershell Gallery.

Open PowerShell as Administrator and execute the following command:

Install-Module -Name AzureAD

Accept the NuGet Provider.

Accept the Untrusted repository.

When the AzureAD package is installed we need to connect to our Azure Active Directory tenant.

Execute:

Connect-AzureAD

This will present a popup for you to connect to your Azure Active Directory. Sign in with your admin credentials.

After you have signed in, a confirmation will appear in your powershell window.

When working with groups and users in Azure Active Directory you need to retrieve the ObjectId assigned to it. The ObjectId is unique to every group and user. So first off we need to find the ObjectId for the group we want to retrieve users from.

Execute:

Get-AzureADGroup -Filter "DisplayName eq 'Your Group Name Here'"

This will return the ObjectId like this

Now we need do the same for the group that we want to assign the users to. Execute the same command from above to find the ObjectId.

ProTip: You can also find the ObjectID in Azure Active Directory -> Groups -> Your Group Name on portal.azure.com

Now that you have both ObjectId we need to make variables and one foreach loop to retrieve and assign each user, if not only the first user will be retrieved. You can also make this in to a script.

$FromGroup = “Your ObjectId” <- Variable with the ObjectId for the group you want to retrive users from.

$ToGroup = “Your ObjectId” <- Variable with the ObjectId for the group you want to add users to.

$Members = Get-AzureADGroupMember -All 1 -ObjectId $FromGroup <- Variable to retrieve the ObjectId for every user inside the group you want to reterive users from.

So, what is Windows AutoPilot? Windows autopilot is a collection of technologies designed to simplify and modernize the deployment and management of your new and existing Windows 10 devices. You can customize the Out of Box Experience (OOBE) with fewer clicks, company brand it and force users to be standard users instead of administrators on their devices. As it is a cloud service you don’t need any extra infrastructure to set it up and IT doesn’t need to be involved with setting up brand-new devices.

Its basically Microsoft’s equivalent of Apples Device Enrollment Program (DEP) if you are familiar with it.

What do you need to setup Windows AutoPilot?

Prerequisites

Azure Active Directory P1 or P2

Company Branding need to be configured in Azure Active Directory (Optional)

The script will generate a .CSV file that should look something like this.

Now that we have generated the info we want, we can add this info to our tenant. We can do this in the Microsoft store for Education/Business or in the Intune portal. In this example I will use the Microsoft store.

Protip: I won’t recommend using the Intune portal at this time as I have seen some strange behavior when importing the CSV files. For example I cannot remove some devices that I added previously.

Log on to your Microsoft store for Education/Business and select devices

Then click Add Devices

Select your AutoPilotInfo.csv file and click open.

Protip: Create a AutoPilot deployment group, you can name it whatever you want. This will make it easier to deploy AutoPilot profiles to several devices at the same time.

Now wait a few seconds..

When your done you will see your device in the list like this:

Now lets create a AutoPilot deployment profile for us to deploy to our newly imported device.

Customize the settings to your needs. In this example I will create a new AutoPilot profile called “TESTVM” i want to skip the privacy settings, disable local admin account creation on the device and skip the EULA.

Now let us assign the AutoPilot deployment profile we just made to our device.

Select your device from the list

Now select the profile we just created.

Now you can see from the list that the AutoPilot deployment profile has been added to the device.

For the end user OOBE will look like this when they enroll their Windows 10 devices.